With airdecap-ng you can decrypt WEP/​WPA/​WPA2 capture files. ​ As well, it can be used to strip the wireless headers from an unencrypted wireless capture.

+

With airdecap-ng you can decrypt WEP/​WPA/​WPA2 capture files. ​ As well, it can also be used to strip the wireless headers from an unencrypted wireless capture.

It outputs a new file ending with "​-dec.cap"​ which is the decrypted/​stripped version of the input file.

It outputs a new file ending with "​-dec.cap"​ which is the decrypted/​stripped version of the input file.

Line 35:

Line 35:

==== WPA/WPA2 Requirements ====

==== WPA/WPA2 Requirements ====

-

The capture file must contain a valid four-way handshake. ​ For this purpose having (packets 2 and 3) or (packets 3 and 4) will work correctly. ​You in fact don't truly need all four handshake packets.

+

The capture file must contain a valid four-way handshake. ​ For this purpose having (packets 2 and 3) or (packets 3 and 4) will work correctly. ​In fact, you don't truly need all four handshake packets.

As well, only data packets following the handshake will be decrypted. ​ This is because information is required from the handshake in order to decrypt the data packets.

As well, only data packets following the handshake will be decrypted. ​ This is because information is required from the handshake in order to decrypt the data packets.